Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
This paper reports on our experiences with using the emerging web service technologies and tools to create a demonstration information broker system as part of our research into i...
Mark Turner, Fujun Zhu, Ioannis A. Kotsiopoulos, M...
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
Asynchronous or self-timed systems that do not rely on a global clock to keep system components synchronized can offer significant advantages over traditional clocked circuits in ...
In this paper, we describe some of the key observations resulting from our work on using software engineering technologies to help detect errors in medical processes. In many ways...
Lori A. Clarke, George S. Avrunin, Leon J. Osterwe...